[qubes-users] Installing Debian template 4.0rc2

2017-11-11 Thread JPL
For some reason the debian template didn't install when I installed Qubes, even though I selected it. No matter I thought, I'll do it manually. However following the instructions here: https://www.qubes-os.org/doc/templates/debian/ namely: [user@dom0 ~]$ sudo qubes-dom0-update

[qubes-users] Re: Installing Debian template 4.0rc2

2017-11-11 Thread JPL
>The first thing to try is 'sudo dnf remove qubes-template-debian-8' to >get the package out of there. That gives an error: qvm-template-preprocess: qube with this name does not exist -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To

Re: [qubes-users] Experimenting with Wireguard VPN @Mullvad.net

2017-11-11 Thread Chris Laprise
On 11/11/2017 10:44 AM, Grogins wrote: Sent with ProtonMail Secure Email. Original Message Subject: [qubes-users] Experimenting with Wireguard VPN @Mullvad.net Local Time: November 6, 2017 4:51 PM UTC Time: November 6, 2017 4:51 PM From:

Re: [qubes-users] Experimenting with Wireguard VPN @Mullvad.net

2017-11-11 Thread 'Grogins' via qubes-users
Sent with [ProtonMail](https://protonmail.com) Secure Email. > Original Message > Subject: [qubes-users] Experimenting with Wireguard VPN @Mullvad.net > Local Time: November 6, 2017 4:51 PM > UTC Time: November 6, 2017 4:51 PM > From: tas...@posteo.net > To: qubes-users

[qubes-users] Re: R4 rc2: Multiple EFI Machines Install Failures

2017-11-11 Thread Yuraeitha
On Saturday, November 11, 2017 at 9:44:33 AM UTC, Eric Duncan wrote: > -BEGIN PGP SIGNED MESSAGE- > Hash: SHA256 > > I'm having a difficult time attempting an EFI install of > Qubes-R4.0-rc2-x86_64.iso across 4 different machines and 3 different USB > sticks made by various procedures.

[qubes-users] Re: Installing Debian template 4.0rc2

2017-11-11 Thread JPL
Thanks for the detailed reply. I have an i7 machine, installing to a USB stick. Strangely, last time I tried (this is my second installation on the same USB having borked the first) debian-8 *did* install so it's obviously a very quirky bug. Whonix installed OK although it seems very slow

Re: [qubes-users] Re: 4.RC2 CANT create / install VM from local iso

2017-11-11 Thread lowson . chris
On Saturday, October 28, 2017 at 1:25:33 PM UTC-4, Filip Magic wrote: > On 10/28/17 11:29, Foppe de Haan wrote: > > On Saturday, October 28, 2017 at 11:27:36 AM UTC+2, Foppe de Haan wrote: > >> On Saturday, October 28, 2017 at 9:49:19 AM UTC+2, Roy Bernat wrote: > >>> On Friday, 27 October 2017

[qubes-users] Re: Installing Debian template 4.0rc2

2017-11-11 Thread Yuraeitha
On Saturday, November 11, 2017 at 12:23:28 PM UTC, JPL wrote: > For some reason the debian template didn't install when I installed Qubes, > even though I selected it. No matter I thought, I'll do it manually. > > However following the instructions here: > >

[qubes-users] Re: Installing Debian template 4.0rc2

2017-11-11 Thread JPL
On Saturday, November 11, 2017 at 12:54:49 PM UTC, Yuraeitha wrote: > On Saturday, November 11, 2017 at 12:23:28 PM UTC, JPL wrote: > > For some reason the debian template didn't install when I installed Qubes, > > even though I selected it. No matter I thought, I'll do it manually. > > > >

[qubes-users] Re: Installing Debian template 4.0rc2

2017-11-11 Thread JPL
>Try run "dnf search qubes-template-*" in dom0, it'll give you a list of all >>installed Qubes templates. Yes I can confirm debian-8 is there. I'll ignore for now and wait til the next update. Thanks for your help. -- You received this message because you are subscribed to the Google Groups

Re: [qubes-users] Does VT-d protect against this?

2017-11-11 Thread Yuraeitha
On Saturday, November 11, 2017 at 3:49:53 AM UTC, tai...@gmx.com wrote: > VT-d, intel's crappy IOMMU doesn't protect you from ME by design. > There is no disabling ME contrary to what some companies might say - > me_cleaner simply nerfs it. > > If you want a PC without black box supervisor

Re: [qubes-users] /var/log excessive filesystem usage

2017-11-11 Thread Chris Laprise
On 11/10/2017 05:57 PM, taii...@gmx.com wrote: On 09/26/2017 03:56 AM, Alex wrote: On 09/26/2017 09:44 AM,taii...@gmx.com wrote: Update: deleting the contents of /var/log, /tmp and /var/tmp caused my system to be unbootable which is silly as these are not meant to be permanent locations I

[qubes-users] Re: R4 rc2: Multiple EFI Machines Install Failures

2017-11-11 Thread Yuraeitha
On Saturday, November 11, 2017 at 9:44:33 AM UTC, Eric Duncan wrote: > -BEGIN PGP SIGNED MESSAGE- > Hash: SHA256 > > I'm having a difficult time attempting an EFI install of > Qubes-R4.0-rc2-x86_64.iso across 4 different machines and 3 different USB > sticks made by various procedures.

Re: [qubes-users] Re: 4.0 rc1 firewall failed stderr cannot execute qrexec-daeomn

2017-11-11 Thread David Hobach
On 11/11/2017 12:52 AM, Stumpy wrote: On 10.11.2017 17:45, David Hobach wrote: On 11/10/2017 05:41 PM, David Hobach wrote: Your point about sys-net not working might very well be part of it as it seems to start sometimes and not others, though the firewall isn't starting 100% of the time.

Re: [qubes-users] Qubes & Quantum decryption Immunity

2017-11-11 Thread Chris Laprise
On 11/10/2017 05:51 PM, taii...@gmx.com wrote: In this case you should ask the luks/dmcrypt mailinglist as that is what qubes uses for disk crypto. Would be simpler off the bat to limit discussion to asymmetric crypto, as that is the type thought to be vulnerable to qc. LUKS/dmcrypt and

Re: [qubes-users] Re: Installing Debian template 4.0rc2

2017-11-11 Thread Yuraeitha
@ Chris Laprise On Saturday, November 11, 2017 at 1:45:07 PM UTC, Chris Laprise wrote: > On 11/11/2017 07:54 AM, Yuraeitha wrote: > > On Saturday, November 11, 2017 at 12:23:28 PM UTC, JPL wrote: > >> For some reason the debian template didn't install when I installed Qubes, > >> even though I

Re: [qubes-users] Relation between increasing RAM and the increased need for display memory

2017-11-11 Thread @LeeteqXV (Twitter & Mastodon.technology)
On 28/09/17 12:32, Zrubi wrote: -BEGIN PGP SIGNED MESSAGE- Hash: SHA256 On 09/21/2017 08:47 PM, Teqleez wrote: Hi all. I assume this is relevant not only for considerations related to the practical limit/benefit of increasing RAM in existing computers, but also regarding the

Re: [qubes-users] Qubes & Quantum decryption Immunity

2017-11-11 Thread Vít Šesták
QC is a potential threat for both symmetric and asymmetric cryptography, just the symmetric cryptography is threatened quite a bit more. And even asymmetric cryptography is important for QubesOS security because of update signatures. Symmetric cryptography is threatened by Grover's algorithm.

Re: [qubes-users] Qubes & Quantum decryption Immunity

2017-11-11 Thread Yuraeitha
On Saturday, November 11, 2017 at 12:44:54 PM UTC, Chris Laprise wrote: > On 11/10/2017 05:51 PM, taii...@gmx.com wrote: > > In this case you should ask the luks/dmcrypt mailinglist as that is > > what qubes uses for disk crypto. > > > > Would be simpler off the bat to limit discussion to

Re: [qubes-users] Re: Installing Debian template 4.0rc2

2017-11-11 Thread Chris Laprise
On 11/11/2017 07:54 AM, Yuraeitha wrote: On Saturday, November 11, 2017 at 12:23:28 PM UTC, JPL wrote: For some reason the debian template didn't install when I installed Qubes, even though I selected it. No matter I thought, I'll do it manually. However following the instructions here:

[qubes-users] View traffic going from/to an appvm? or going through the sys-firewall?

2017-11-11 Thread Stumpy
I posted earlier about trying to limit traffic on some appvms and got some helpful feedback about specific services but I am now thinking it would be most useful to just see traffic leaving a appvm and then adding rules based on that. problem is, i don't know how to view appvm network traffic.

[qubes-users] Re: Installing Debian template 4.0rc2

2017-11-11 Thread Yuraeitha
On Saturday, November 11, 2017 at 2:19:22 PM UTC, JPL wrote: > >The first thing to try is 'sudo dnf remove qubes-template-debian-8' to > >get the package out of there. > > That gives an error: qvm-template-preprocess: qube with this name does not > exist Try run "dnf search qubes-template-*"

Re: [qubes-users] /var/log excessive filesystem usage

2017-11-11 Thread Chris Laprise
On 11/11/2017 03:38 PM, taii...@gmx.com wrote: Wait fedora doesn't sign their stuff? Damn that's terrible! So when you dnf something there isn't any gpg verification of the files? Fedora signs packages individually. But nearly all (except Fedora) sign the overall repository manifest as

Re: [qubes-users] Re: Installing Debian template 4.0rc2

2017-11-11 Thread Chris Laprise
On 11/11/2017 08:51 AM, Yuraeitha wrote: @ Chris Laprise On Saturday, November 11, 2017 at 1:45:07 PM UTC, Chris Laprise wrote: On 11/11/2017 07:54 AM, Yuraeitha wrote: On Saturday, November 11, 2017 at 12:23:28 PM UTC, JPL wrote: For some reason the debian template didn't install when I

[qubes-users] Re: 4.RC2 CANT create / install VM from local iso

2017-11-11 Thread rodin
Same here. VM starts and I get: Booting from ROM Probing EDD...ok Then exits. The ISO is good. I can dd>USB and it boots. p.s. Outback Dingo, you don't need to sudo your qvm-start command. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To

Re: [qubes-users] Experimenting with Wireguard VPN @Mullvad.net

2017-11-11 Thread Chris Laprise
On 11/11/2017 10:44 AM, Grogins wrote: > Have tried to get Wireguard up on multiple occasions with both Debian > and Fedora I get similar results every time. i.e. at step 3: > > [root@wireguardtey)mp ~]# qvm-copy-to-vm vpn /lib/modules/$(uname > -r)/extra/wireguard.ko > qfile-agent: Fatal

Re: [qubes-users] Propspect : When upgrading to the next stable version of Qubes 4.0XXX

2017-11-11 Thread Andrew David Wong
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 On 2017-11-11 13:01, brutellealexan...@gmail.com wrote: > When there will be a stable supported version of Qubes 4., and I > upgrade, will I be able to keep all my set ups and docs on each on > my VM's ? > > Or will I have to wipe it all in order

[qubes-users] Re: Experimenting with Wireguard VPN @Mullvad.net

2017-11-11 Thread 'grogins' via qubes-users
grogins: > Chris Laprise: >> Mullvad recently added trial Wireguard VPN support, so I wrote a howto >> for setting it up on Qubes: >> >> https://github.com/tasket/Qubes-vpn-support/wiki/Wireguard-VPN-connections-in-Qubes-OS >> >> >> This is Debian-oriented but easy to adapt for Fedora. >> > Have

Re: [qubes-users] Re: Is there a way to use secure boot with qubes?

2017-11-11 Thread Leo Gaspard
On 11/09/2017 12:27 PM, blacklight wrote: > On Wednesday, 8 November 2017 20:52:14 UTC, Guerlan wrote: >> My computer complains about bad signature when I try to install qubes. Is >> there a way to install it without disabling secure boot? Does qubes support >> secure boot? Is there a way to

[qubes-users] Re: Cannot Attach ISO to Windows 7 VM

2017-11-11 Thread Person
How exactly do you edit a configuration file from the terminal? -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To

[qubes-users] Re: Cannot Attach ISO to Windows 7 VM

2017-11-11 Thread Person
Where is the line in the config file where I change the video driver from “xen” to “cirrus”? -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to

[qubes-users] Qubes3.2 sys-firewall iptables rules altered upon start of appvm, deletion of previous rules

2017-11-11 Thread cyberian
Greetings, I have custom iptables rules for sys-firewall that is applied during sys-firewall startup via /rw/config/rc.local When I startup an app VM it automatically alters the sys-firewall iptables rules entirely and replaces my custom rule set with another set. Is there a way I can

Re: [qubes-users] Qubes & Quantum decryption Immunity

2017-11-11 Thread Chris Laprise
On 11/11/2017 08:31 AM, Yuraeitha wrote: On Saturday, November 11, 2017 at 12:44:54 PM UTC, Chris Laprise wrote: On 11/10/2017 05:51 PM, taii...@gmx.com wrote: In this case you should ask the luks/dmcrypt mailinglist as that is what qubes uses for disk crypto. Would be simpler off the bat to

Re: [qubes-users] Re: Please specify which Qubes version you are using when you post

2017-11-11 Thread Andrew David Wong
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 On 2017-11-10 15:27, Yuraeitha wrote: > On Thursday, November 9, 2017 at 11:15:16 PM UTC, Unman wrote: >> Now there are increasing numbers of people using 4rc2, it would >> be really helpful if you specify WHICH version you are using when >> you

Re: [qubes-users] Failed to verify R4.0 rc2 digests

2017-11-11 Thread Andrew David Wong
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 On 2017-11-11 14:34, nicholas roveda wrote: > I've just finished to download all the files for R4.0 rc2, but the > verification failed. > > gpg --verify Qubes-R4.0-rc2-x86_64.iso.asc > Qubes-R4.0-rc2-x86_64.iso.DIGESTS > gpg: Signature

[qubes-users] Re: Qubes3.2 sys-firewall iptables rules altered upon start of appvm, deletion of previous rules

2017-11-11 Thread cyberian
Nevermind, I should have skimmed through the documentation first. I found /rw/config/qubes-firewall-user-script case closed. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send

[qubes-users] Propspect : When upgrading to the next stable version of Qubes 4.0XXX

2017-11-11 Thread brutellealexandre
When there will be a stable supported version of Qubes 4., and I upgrade, will I be able to keep all my set ups and docs on each on my VM's ? Or will I have to wipe it all in order to upgrade and install the new version ? -- You received this message because you are subscribed to the Google

Re: [qubes-users] /var/log excessive filesystem usage

2017-11-11 Thread taii...@gmx.com
On 11/11/2017 06:58 AM, Chris Laprise wrote: Systemd linux takes 1min+ to boot vs 15 seconds on devuan's plane jane SysVinit (redhat only created systemd to run a hostile takeover of the linux community ... you must be new to Linux. :) Redhat has long exercised undue influence over Linux

[qubes-users] Re: HCL - ASUS PRIME B350M-A + AMD Ryzen 7 1700X

2017-11-11 Thread Foppe de Haan
On Saturday, November 11, 2017 at 8:12:17 PM UTC+1, David Schissler wrote: > Does the AMD Ryzen equivalent of VT-d work properly? It seemed that AMD > setups were quite deficient before and I'm hoping that they will become first > class with Zen and Ryzen. Lenovo recently a Thinkpad with an

[qubes-users] Re: HCL - ASUS PRIME B350M-A + AMD Ryzen 7 1700X

2017-11-11 Thread David Schissler
Does the AMD Ryzen equivalent of VT-d work properly? It seemed that AMD setups were quite deficient before and I'm hoping that they will become first class with Zen and Ryzen. Lenovo recently a Thinkpad with an older AMD CPU and I'm guessing that it was a warmup for a Ryzen option by the

[qubes-users] Failed to verify R4.0 rc2 digests

2017-11-11 Thread nicholas roveda
I've just finished to download all the files for R4.0 rc2, but the verification failed. gpg --verify Qubes-R4.0-rc2-x86_64.iso.asc Qubes-R4.0-rc2-x86_64.iso.DIGESTS gpg: Signature made Sat Oct 21 10:10:36 2017 BST using RSA key ID 9E2795E9 gpg: BAD signature from "Qubes OS Release 4

Re: [qubes-users] Does VT-d protect against this?

2017-11-11 Thread taii...@gmx.com
On 11/11/2017 06:27 AM, Yuraeitha wrote: How on earth are these people getting away these crimes against humanity? It's truly mindblowing. People keep buying their crap, or giving them their data[1], and the MSS has paid off all the right people. (ME as an No Such Agency project is too

[qubes-users] Re: HCL - ASUS PRIME B350M-A + AMD Ryzen 7 1700X

2017-11-11 Thread Foppe de Haan
On Saturday, November 11, 2017 at 10:25:42 PM UTC+1, Foppe de Haan wrote: > On Saturday, November 11, 2017 at 8:12:17 PM UTC+1, David Schissler wrote: > > Does the AMD Ryzen equivalent of VT-d work properly? It seemed that AMD > > setups were quite deficient before and I'm hoping that they will

Re: [qubes-users] Propspect : When upgrading to the next stable version of Qubes 4.0XXX

2017-11-11 Thread Alexandre Brutelle
Thank you for your reply ! Do you think such upgrade to the next stable version will happen anytime soon ? On 12 November 2017 at 00:47, Andrew David Wong wrote: > -BEGIN PGP SIGNED MESSAGE- > Hash: SHA512 > > On 2017-11-11 13:01, brutellealexan...@gmail.com wrote:

Re: [qubes-users] Re: 4.0 rc1 firewall failed stderr cannot execute qrexec-daeomn

2017-11-11 Thread Stumpy
On 11.11.2017 13:43, David Hobach wrote: On 11/11/2017 12:52 AM, Stumpy wrote: On 10.11.2017 17:45, David Hobach wrote: On 11/10/2017 05:41 PM, David Hobach wrote: Your point about sys-net not working might very well be part of it as it seems to start sometimes and not others, though

[qubes-users] Re: Installing Debian template 4.0rc2

2017-11-11 Thread Yuraeitha
On Saturday, November 11, 2017 at 1:27:33 PM UTC, JPL wrote: > Thanks for the detailed reply. I have an i7 machine, installing to a USB > stick. Strangely, last time I tried (this is my second installation on the > same USB having borked the first) debian-8 *did* install so it's obviously a >

Re: [qubes-users] Re: Question to Mirage OS firewall users

2017-11-11 Thread Thomas Leonard
On Thursday, November 9, 2017 at 4:18:13 AM UTC, Jean-Philippe Ouellet wrote: > On Wed, Nov 8, 2017 at 3:09 PM, Thomas Leonard wrote: > > On Thursday, April 13, 2017 at 1:33:53 PM UTC+1, Thomas Leonard wrote: > >> On Thursday, April 13, 2017 at 11:08:11 AM UTC+1, Foppe de Haan wrote: > >> > On

Re: [qubes-users] Re: 4.0 rc1 firewall failed stderr cannot execute qrexec-daeomn

2017-11-11 Thread Yuraeitha
On Saturday, November 11, 2017 at 1:40:24 PM UTC, Stumpy wrote: > On 11.11.2017 13:43, David Hobach wrote: > > On 11/11/2017 12:52 AM, Stumpy wrote: > >> > >> > >> On 10.11.2017 17:45, David Hobach wrote: > >>> On 11/10/2017 05:41 PM, David Hobach wrote: > > > Your point about sys-net

[qubes-users] Re: Preparing installation USB from Mac OSX

2017-11-11 Thread Eric Duncan
On Tuesday, February 17, 2015 at 6:20:36 AM UTC-5, onnozw...@gmail.com wrote: > Hi, > > I didn't find any recipe to install Qubes on a USB stick from OSX; > specifically at https://qubes-os.org/wiki/InstallationGuideR2 where I would > expect such info. I'd like to suggest the following text

[qubes-users] Re: HCL - ASUS PRIME B350M-A + AMD Ryzen 7 1700X

2017-11-11 Thread Foppe de Haan
On Saturday, November 11, 2017 at 12:37:58 AM UTC+1, qua terniol wrote: > This week I installed Qubes 4.0-rc2 on my new AMD Ryzen 7 build. > It complained during configuration after installation, but it seems to work. > > Firefox in the VMs can access internet. > > (This did not work on an AMD

[qubes-users] Re: IP Redirection to localhost in AppVM

2017-11-11 Thread Yuraeitha
On Friday, November 10, 2017 at 9:40:56 PM UTC, Michael Strasser wrote: > Hi! > > I have an AppVM (Standalone) in which I would like to redirect all (TCP) > traffic going to a specific IP address to localhost. I'm using the AppVM > for Malware Analysis, so I usually have no NetVM connected. I've

[qubes-users] R4 rc2: Multiple EFI Machines Install Failures

2017-11-11 Thread Eric Duncan
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 I'm having a difficult time attempting an EFI install of Qubes-R4.0-rc2-x86_64.iso across 4 different machines and 3 different USB sticks made by various procedures. * Installing to an Asmedia USB3 device (all systems detect as HDD) * Must use

Re: [qubes-users] Qubes & Quantum decryption Immunity

2017-11-11 Thread Yuraeitha
@ Sandy Harris On Friday, November 10, 2017 at 10:29:48 PM UTC, Sandy Harris wrote: > On Fri, Nov 10, 2017 at 1:45 PM, Yuraeitha wrote: > > > Either way, cryptography protected by "structure", should be safe against a > > quantum computer, no? while all encryption without

Re: [qubes-users] Qubes & Quantum decryption Immunity

2017-11-11 Thread Yuraeitha
On Friday, November 10, 2017 at 10:29:48 PM UTC, Sandy Harris wrote: > On Fri, Nov 10, 2017 at 1:45 PM, Yuraeitha wrote: > > > Either way, cryptography protected by "structure", should be safe against a > > quantum computer, no? while all encryption without structure, would